WO2020001105A1 - Procédé et appareil de vérification de données basées sur une chaîne de blocs, et dispositif électronique - Google Patents

Procédé et appareil de vérification de données basées sur une chaîne de blocs, et dispositif électronique Download PDF

Info

Publication number
WO2020001105A1
WO2020001105A1 PCT/CN2019/080021 CN2019080021W WO2020001105A1 WO 2020001105 A1 WO2020001105 A1 WO 2020001105A1 CN 2019080021 W CN2019080021 W CN 2019080021W WO 2020001105 A1 WO2020001105 A1 WO 2020001105A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
target data
blockchain
verification
stored
Prior art date
Application number
PCT/CN2019/080021
Other languages
English (en)
Chinese (zh)
Inventor
叶国俊
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to KR1020207018958A priority Critical patent/KR102460055B1/ko
Priority to EP19825968.1A priority patent/EP3720045B1/fr
Priority to CA3087297A priority patent/CA3087297A1/fr
Priority to JP2020536645A priority patent/JP2021515427A/ja
Priority to SG11202006029RA priority patent/SG11202006029RA/en
Priority to AU2019295815A priority patent/AU2019295815C1/en
Publication of WO2020001105A1 publication Critical patent/WO2020001105A1/fr
Priority to US16/888,580 priority patent/US20200294048A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14131D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Definitions

  • One or more embodiments of the present specification relate to the field of blockchain technology, and in particular, to a method and an apparatus for verifying data based on a blockchain, and an electronic device.
  • Blockchain technology also known as distributed ledger technology, is an emerging technology in which several computing devices participate in "accounting" and jointly maintain a complete distributed database. Because blockchain technology has the characteristics of decentralization, openness and transparency, each computing device can participate in database records, and the data can be quickly synchronized between computing devices, making blockchain technology widely used in many fields. Apply.
  • This specification proposes a blockchain-based data verification method, which includes:
  • the target data has been stored in the blockchain, obtaining the target data from the storage location indicated by the data identifier; wherein the target data stored on the blockchain carries a The verification information of the target data for authenticity verification;
  • the target data published by the data provider carries a graphic code generated based on the data identifier
  • the data identifier of the target data published by the obtained data provider on the blockchain includes:
  • the data identifier is a transaction hash value of a transaction that includes the target data
  • the determining whether the target data has been stored in the blockchain based on the data identifier includes:
  • SPV verification is performed on the transaction based on the transaction hash value of the transaction containing the target data to determine whether the transaction has been stored in the blockchain.
  • performing the authenticity verification on the acquired target data based on the verification information includes:
  • a smart contract issued on the blockchain is invoked, a verification program declared in the smart contract is executed, and the obtained target data is verified for authenticity based on the verification information.
  • the target data stored on the blockchain further includes auxiliary information related to the authenticity verification; the verification information is based on the original content of the target data and the auxiliary information.
  • the authenticating the acquired target data based on the verification information includes:
  • the auxiliary information includes any one or a combination of the following information:
  • the upload location of the target data is the upload location of the target data.
  • Optional also includes:
  • This specification also proposes a blockchain-based data verification device, which includes:
  • a first acquisition module acquires a data identifier of a target data published on a blockchain by a data provider; wherein the data identifier indicates a storage location of the target data on the blockchain;
  • a determining module that determines whether the target data has been stored in the blockchain based on the data identifier
  • a second obtaining module if the target data has been stored in the blockchain, obtaining the target data from the storage location indicated by the data identifier; wherein the target data stored in the blockchain is Carrying verification information for authenticating the target data;
  • the verification module verifies the authenticity of the obtained target data based on the verification information, and outputs a verification result to a data verifier.
  • the target data published by the data provider carries a graphic code generated based on the data identifier
  • the first obtaining module
  • the data identifier is a transaction hash value of a transaction that includes the target data
  • the determination module :
  • SPV verification is performed on the transaction based on the transaction hash value of the transaction containing the target data to determine whether the transaction has been stored in the blockchain.
  • the verification module :
  • a smart contract issued on the blockchain is invoked, a verification program declared in the smart contract is executed, and the obtained target data is verified for authenticity based on the verification information.
  • the target data stored on the blockchain further includes auxiliary information related to the authenticity verification; the verification information is based on the original content of the target data and the auxiliary information.
  • the verification module further:
  • the auxiliary information includes any one or a combination of the following information:
  • the upload location of the target data is the upload location of the target data.
  • the second obtaining module further:
  • This specification also proposes an electronic device, including:
  • Memory for storing machine-executable instructions
  • the processor by reading and executing the machine-executable instructions corresponding to the control logic of the blockchain-based data verification stored in the memory, the processor is caused to:
  • the target data has been stored in the blockchain, obtaining the target data from the storage location indicated by the data identifier; wherein the target data stored on the blockchain carries a The verification information of the target data for authenticity verification;
  • FIG. 1 is a flowchart of a blockchain-based data verification method according to an exemplary embodiment
  • FIG. 2 is a schematic diagram of an alliance chain provided by an exemplary embodiment
  • FIG. 3 is a schematic structural diagram of an electronic device according to an exemplary embodiment
  • FIG. 4 is a block diagram of a blockchain-based data verification apparatus according to an exemplary embodiment.
  • a standard data storage format can be defined for the target data, and the above target data is uploaded to the blockchain node device accessed by the upload client through the upload client according to the defined data storage format.
  • the defined data storage format may include verification information used to verify the authenticity of the target data.
  • the node device After receiving the target data uploaded by the upload client, the node device can publish the target data in the blockchain, and store the target data in the blockchain after the consensus processing of the node devices in the blockchain. Distributed database.
  • the node device in the blockchain can return to the data provider an upload client that can indicate the storage location of the above target data on the blockchain.
  • Data identification for example, in practical applications, the foregoing data identification may specifically be a transaction hash value of a transaction in which the target data is recorded.
  • the data provider can perform the data identification on the blockchain of the target data and the target data returned by the node device in the blockchain. Post publicly; for example, through a website.
  • the data validator can verify the authenticity of the target data published by the data provider after verifying the target data published by the data provider and the data identification of the target data on the blockchain.
  • the verification client can obtain the above-mentioned data identifier issued by the data provider, and verify whether the above-mentioned target data has been stored in the distributed database of the blockchain based on the data identifier.
  • the target data stored on the blockchain can be further obtained from the storage location indicated by the data identifier, and then based on the The verification information carried in the target data is used to verify the authenticity of the target data, and the verification client outputs the verification result to the data verifier.
  • FIG. 1 is a blockchain-based data verification method provided by an embodiment of the present specification, which is applied to verify a client and performs the following steps:
  • Step 102 Obtain a data identifier of the target data published on the blockchain by the data provider; wherein the data identifier indicates a storage location of the target data on the blockchain;
  • Step 104 Determine whether the target data has been stored in the blockchain based on the data identifier.
  • Step 106 if the target data has been stored in the blockchain, obtain the target data from the storage location indicated by the data identifier; wherein the target data stored on the blockchain carries a user Verification information for performing authenticity verification on the target data;
  • Step 108 Perform authenticity verification on the acquired target data based on the verification information, and output a verification result to a data verifier.
  • the above target data may specifically include any form of digital information corresponding to physical objects in the real world that can be stored on the blockchain and can be publicly released through the Internet;
  • the above target data may specifically be a commercial quality inspection report issued by an offline quality inspection agency, and when a merchant publishes a product through an e-commerce platform, the product image and the commercial quality of the product may be The report of the inspection report is published together.
  • the foregoing data identification may specifically include any form of identification information capable of indicating a storage location of data stored on the blockchain on the blockchain;
  • the above data identifier may specifically be the transaction hash of the transaction containing the data. Through the transaction hash, you can quickly locate the transaction that contains the data. Of course, in practical applications, the foregoing data identifier may also specifically adopt the transaction number of the transaction in which the data is collected.
  • the blockchain described in this specification may specifically include any type of blockchain network.
  • the above-mentioned blockchain may specifically be an alliance chain composed of several merchants, quality inspection agencies, and several ordinary consumers.
  • the quality inspection agency can access any node device on the alliance chain through the upload client, and upload the quality inspection report to the node device in the form of digital information, and the node device is in the blockchain Initiate a consensus process for the quality inspection report of the business, and after the consensus is passed, store the quality inspection report of the business into the distributed database of the blockchain.
  • Merchants can serve as data providers and publicly publish commercial quality inspection reports issued by quality inspection agencies through the e-commerce platform; while ordinary consumers can also verify client access when viewing commercial quality inspection reports published by merchants. Go to any node device on the alliance chain and initiate the authenticity verification of the quality inspection report of the merchant.
  • the above target data is used as a commercial quality inspection report
  • the above-mentioned blockchain is an alliance chain composed of an alliance chain composed of a number of merchants, quality inspection agencies, and several ordinary consumers.
  • FIG. 2 is a schematic diagram of an alliance chain shown in this specification.
  • the operator of the blockchain can pre-establish an alliance chain composed of several node devices, and merchants, commercial quality inspection agencies, and ordinary consumers can register in the alliance chain and obtain After the legal identity on the chain (such as obtaining the private key and public key pair assigned by the alliance chain), it will access the alliance chain as a member of the alliance.
  • the commercial quality inspection agency can access the node equipment in the alliance chain through the upload client, and upload the commercial quality inspection report issued by the merchant to the node in the form of digital information. device.
  • Ordinary consumers can access the node devices in the alliance chain by verifying the client.
  • ordinary consumers see the merchant quality inspection report published by the merchant, they can initiate a verification of the product through the verification client Authenticity verification of quality inspection report.
  • upload client and verification client described above may be a web client (such as a blockchain browser) or a native APP application, which are not particularly limited in this specification.
  • the quality inspection agency can define a standard data storage format for the quality inspection report that needs to be uploaded. After the commercial quality inspection agency issues a commercial quality inspection report for the goods entrusted by the merchant, it can organize the commercial quality inspection report into a standard data storage format, sign it based on the private key held by the commercial quality inspection agency, and upload it. To the blockchain node device accessed by the upload client.
  • the data storage format defined for the quality inspection report may include the original content of the data, verification information, and auxiliary information.
  • the above verification information is specifically used to verify the authenticity of the data.
  • the auxiliary information may be auxiliary parameters related to the authenticity verification.
  • the verification information may specifically be a hash value obtained by performing a hash calculation based on the original content of the quality inspection report and the auxiliary information.
  • the above-mentioned auxiliary information may specifically include any one or a combination of information such as an identity of the data uploader, an upload time stamp, and an upload location.
  • Serial number Field Name Field content 1 Content field Fill the original content of the data 2 Uploader identity field Fill in the identity of the uploader 3 Upload time field Upload timestamp of filled data 4 Upload location field Upload data populated 5 Check Information Field Fill the hash value calculated based on fields 1-4
  • the specific form of the original content of the data filled in the content field is not particularly limited in this specification; for example, it may be in the form of a picture.
  • the identity identifier filled in the above uploader identity field may specifically adopt any form of information capable of indicating the identity of the uploader; for example, an ID card number, fingerprint information, digital certificate signature, and so on.
  • the time stamp filled in the above upload time field shall be based on the universal world time, to prevent the ambiguity caused by the inconsistency in the understanding of the same time between people in a certain area and other different time zones; for example; the Beijing time zone is relative to the New York time zone. Understanding at the same time can cause ambiguity.
  • the above upload location field must also be prevented from being used, which may cause ambiguous address descriptions; for example, "Zhongshan Road”, there may be many cities with Zhongshan Road.
  • the most appropriate way is to use longitude and latitude coordinates, GeoHash and other unambiguous address expressions.
  • the node device in the alliance chain after the node device in the alliance chain receives the quality inspection report uploaded by the upload client, it can firstly use the public key corresponding to the private key held by the above-mentioned quality inspection agency to report the quality inspection report of the merchant. If the signature verification is passed, it indicates that the merchant quality inspection report is the information uploaded by a legitimate merchant quality inspection agency. At this time, the target data can be further published in the blockchain. After the node device's consensus is processed, the above-mentioned quotient quality inspection report is stored in the distributed database of the blockchain.
  • the consensus algorithm used in the alliance chain is not particularly limited in this specification; for example, mainstream consensus algorithms such as pbft, which are suitable for use in the alliance chain, can also be used, or the operators of the alliance chain can independently develop related algorithms. Consensus algorithm.
  • the node devices in the blockchain can also upload the client to the business quality inspection agency, and return a message indicating that the above-mentioned business quality inspection report is in the block.
  • the data identifier of the storage location on the chain is a part of the chain.
  • the above data identifier may specifically be a transaction hash value of a transaction in which the quality inspection report of the merchant is recorded.
  • the quality inspection agency may also send the generated quality inspection report and the above-mentioned data identifier returned by the node device in the alliance chain to the merchant.
  • the merchant can publish it to ordinary consumers through the website; for example, it can be published to consumers along with product pictures in the e-commerce platform.
  • the consumer after viewing the data identification of the merchant quality inspection report published on the blockchain by the merchant, the consumer can manually enter and submit the viewed data in the user interface provided by the verification client.
  • logo The verification client may obtain the data identifier manually input by the user, and then initiate verification of the above-mentioned quality inspection report based on the obtained data identifier.
  • the business quality inspection report when a merchant releases the above-mentioned business quality inspection report, the business quality inspection report may be carried in the form of a graphic code (such as a two-dimensional code or a bar code) and carried in the publicly released business quality inspection report.
  • a graphic code such as a two-dimensional code or a bar code
  • the merchant can use the string corresponding to the transaction hash value as the encoding information to generate the corresponding graphic code, and then encode the generated graphic Attached to the image of the publicly released quality inspection report.
  • an ordinary consumer can perform a scanning operation on the graphic code through the verification client, and the verification client analyzes the scanned graphic code to obtain the data identifier carried in the graphic code, and then Based on the parsed data identifier, verification of the above-mentioned quality inspection report is initiated.
  • the verification client after the verification client obtains the data identifier of the commercial quality inspection report published by the merchant on the alliance chain, it can determine whether the commercial quality inspection report has been stored in the distributed distribution of the alliance chain based on the data identifier. database.
  • SPV Simple payment verification
  • SPV is a protocol used to verify whether a transaction already exists in the distributed database of the blockchain.
  • the specific process of SPV authentication based on the transaction hash is described in detail below.
  • the blocks in a blockchain are usually composed of a block header and a block body (including transactions).
  • the transactions included in the block are usually organized into Merkle trees in the form of transaction hash values.
  • the Merkle authentication path of the transaction in the Merkle tree containing the target block of the transaction can be obtained first;
  • the Merkle authentication path specifically refers to a transaction hash value of a transaction, and the Merkle tree is traversed step by step to find a path composed of sibling nodes (ie, adjacent nodes) corresponding to the nodes on the passed path.
  • the Merkle authentication path of the transaction can be used as a calculation parameter for calculating the hash value corresponding to the root node of the Merkle tree in which the exchange is located.
  • the Merkle authentication path can be manually submitted by the user, or the verification client can actively query the blockchain;
  • the above verification client when the above verification client actively queries to obtain the Merkle authentication path of the transaction in the Merkle tree containing the target block of the transaction, it may first locate the target block in the exchange based on the transaction hash value of the transaction;
  • the process of locating the block where the exchange is located based on the transaction hash value is not described in detail in this description; for example, in the related technology, the zone where the transaction hash value is located can be located by deploying a bloom filter Piece. After locating the block where the exchange is located, you can further find the Merkle authentication path of the transaction in the Merkle tree from the located Merkle tree of the block.
  • the hash value of the block header of the target block can be calculated based on the calculation process specified by the SPV protocol. (That is, the hash value of the root node of the Merkle tree of the target block); then, determine whether the calculated hash value of the block header of the target block matches the hash value stored in the block header of the target block; If they match, it can be determined that the transaction is included in the target block; that is, the above-mentioned quotient quality inspection report has been successfully included in the distributed database stored in the alliance chain. Conversely, if they do not match, it indicates that the transaction is not included in the target block; that is, the above-mentioned quality inspection report was not successfully included in the distributed database of the alliance.
  • the above-mentioned quality inspection report may be further obtained from the storage location indicated by the above data identifier.
  • the corresponding transaction can be located based on the transaction hash, and then read from the identified transaction and included in the transaction. Quality inspection report.
  • the verification information carried in the standard storage format of the quality inspection report can be further read, and then based on the verification information, The quality inspection report obtained from the distributed database of the alliance chain is verified for authenticity.
  • the above-mentioned authenticity verification refers specifically to verifying whether the original content recorded in the above-mentioned quality inspection report has been tampered with;
  • a commercial quality inspection agency issues a commercial quality inspection report
  • it can organize the commercial quality inspection report into a standard data storage format and send it to the merchant for uploading.
  • some Poorly reputable merchants may maliciously modify some fields in the quality inspection report before uploading.
  • some fields may be maliciously modified after being illegally intercepted.
  • the verification client verifies the authenticity of the business quality inspection report obtained from the distributed database of the alliance chain based on the verification information carried in the above-mentioned business quality inspection report, it may specifically perform local It can be implemented by the built-in verification program, and it can also be implemented by remotely calling the smart contract deployed on the alliance chain.
  • the verification client may be equipped with a verification program for authenticity verification of the quotient quality inspection report
  • the authenticity verification rules of the above-mentioned commercial quality inspection report may be publicly released by the commercial quality inspection agency as the data uploader, and the developer of the verification client may, according to the verification rules issued by the aforementioned commercial quality inspection agency, Corresponding program execution code (for example, a function corresponding to the execution logic of the verification rule) is developed in the software environment of the verification client.
  • Corresponding program execution code for example, a function corresponding to the execution logic of the verification rule
  • the verification client After the verification client confirms that the above-mentioned quality inspection report has been stored in the distributed database of the alliance chain and obtained the quality inspection report stored on the alliance chain, it can read from the obtained above-mentioned quality inspection report.
  • Take the above verification information for example, taking the data storage format shown in the above Table 1 as an example, the above verification information can be read from the field 5 shown in Table 1.
  • the above-mentioned verification procedure provided locally may be executed to verify the authenticity of the commercial quality inspection report obtained from the alliance chain based on the read verification information.
  • a smart contract may also be deployed in the above-mentioned alliance chain, and a verification procedure for authenticating the above-mentioned quality inspection report of the merchant is declared in the smart contract;
  • the operator of the alliance chain can develop the corresponding contract code based on the authenticity verification rules issued by the commercial quality inspection agency as the data uploader for the aforementioned commercial quality inspection report, deploy smart contracts, and then convert the smart contracts. It is published in the alliance chain, and the node devices in the alliance chain perform consensus processing, and after the consensus is passed, it is stored in the distributed database of the alliance chain for remote access by clients accessing the alliance chain.
  • the verification client After the verification client confirms that the above-mentioned quality inspection report has been stored in the distributed database of the alliance chain and obtained the quality inspection report stored on the alliance chain, it can read from the obtained above-mentioned quality inspection report. Take the above verification information, construct a transaction based on the verification information and submit it to the smart contract, initiate a call to the smart contract, execute the verification procedure declared in the smart contract, and based on the read verification information, the The quality inspection report obtained on the alliance chain is verified for authenticity.
  • a hash value obtained by performing a hash calculation based on the verification information is based on the original content of the quality inspection report and the auxiliary information carried in the data storage format of the quality inspection report.
  • the authenticity verification of the above-mentioned quality inspection report can be performed against
  • the data storage format of the above-mentioned quality inspection report obtained on the alliance chain is carried in the original content of the above-mentioned quality inspection report and the above-mentioned auxiliary information, and a hash calculation is performed to obtain a hash value.
  • the calculated hash value can be matched with the hash value carried as the verification information in the data storage format of the above-mentioned business quality inspection report to determine that the calculated hash value is stored with the data of the above-mentioned business quality inspection report.
  • the hash value carried in the format as the above verification information is the same; if the two are the same, it means that the content carried in the above-mentioned business quality inspection report stored on the alliance chain has not been tampered with, at this time, the above business quality inspection report passed the authenticity Verification; of course, if the two are not the same, it means that the content carried in the above-mentioned merchant quality inspection report stored on the alliance chain has been tampered with. At this time, the above merchant quality inspection report has not passed the authenticity verification.
  • the authenticity verification result may be output to an ordinary consumer through the above verification client.
  • the consumer may refer to the above-mentioned business quality output by the verification client.
  • the above-mentioned quotient quality inspection report obtained from the alliance chain can also be output to ordinary consumers through the above verification client, so that ordinary consumers can check the quotient quality stored on the alliance chain.
  • the report is compared with the commercial quality inspection report published by the merchant.
  • the above-mentioned quality inspection report can be immediately output to consumers when the above-mentioned quality inspection report is obtained from the alliance chain; the authenticity verification of the above-mentioned quality inspection report can also be completed, and After the authenticity verification result is output to an ordinary consumer through the above verification client, it is selectively output to the consumer;
  • the above-mentioned authenticity verification result indicates that the above-mentioned commercial quality inspection report passes the authenticity verification
  • the above-mentioned commercial quality inspection report obtained from the alliance chain may be output and displayed to consumers.
  • the above-mentioned quality inspection report does not pass the authenticity verification, the above-mentioned quality inspection report will no longer be output to consumers. In this way, it can be ensured that consumers can only view the commercial quality inspection report that has passed the authenticity verification.
  • the above embodiments are described by taking the above-mentioned target data as the quotient quality inspection report as an example; obviously, in practical applications, the above-mentioned target data may also be data in a form other than the quotient quality inspection report.
  • the above target data is data in a form other than the quality inspection report, those skilled in the art can refer to the implementation process described in the above embodiments to implement the technical solutions described in this specification equivalently, and will not be described in this specification. Go into details.
  • the merchant quality inspection report corresponding to the data identifier is not stored on the blockchain, it indicates that the data identifier published by the merchant may be a false data identifier, that is, The quality inspection report published by the merchant may not be real.
  • the commercial quality inspection report stored on the blockchain does not pass the authenticity verification, it indicates that the commercial quality inspection report may be illegally tampered before uploading or during the upload transmission process, so that consumers can obtain it in time. Know this anomaly.
  • this specification also provides an embodiment of a blockchain-based data verification device.
  • the embodiments of the blockchain-based data verification device of this specification can be applied to electronic devices.
  • the device embodiments can be implemented by software, or by hardware or a combination of software and hardware. Taking software implementation as an example, as a device in a logical sense, it is formed by reading the corresponding computer program instructions in the non-volatile memory into the memory through the processor of the electronic device where it is located.
  • FIG. 3 a hardware structure diagram of the electronic device in which the blockchain-based data verification device is located in this specification, except for the processor, memory, network interface, and non-processor shown in FIG. 3.
  • the electronic device in which the device is located in the embodiment may generally include other hardware according to the actual function of the electronic device, and details are not described herein again.
  • Fig. 4 is a block diagram of a blockchain-based data verification device according to an exemplary embodiment of the present specification.
  • the blockchain-based data verification device 40 may be applied to the aforementioned electronic device shown in FIG. 3 and includes: a first obtaining module 401, a determining module 402, a second obtaining module 403, and a verification module. 403.
  • a first obtaining module 401 obtains a data identifier of a target data published on a blockchain by a data provider; wherein the data identifier indicates a storage location of the target data on the blockchain;
  • the determining module 402 determines whether the target data has been stored in the blockchain based on the data identifier
  • a second obtaining module 403 if the target data has been stored in the blockchain, obtain the target data from a storage location indicated by the data identifier; wherein the target data stored on the blockchain Carrying verification information for authenticating the target data;
  • the verification module 404 verifies the authenticity of the obtained target data based on the verification information, and outputs a verification result to a data verifier.
  • the target data published by the data provider carries a graphic code generated based on the data identifier
  • the first obtaining module 401 The first obtaining module 401:
  • the data identifier is a transaction hash value of a transaction that includes the target data
  • the determining module 402 is a determining module 402 :
  • SPV verification is performed on the transaction based on the transaction hash value of the transaction containing the target data to determine whether the transaction has been stored in the blockchain.
  • the verification module 404 the verification module 404:
  • a smart contract issued on the blockchain is invoked, a verification program declared in the smart contract is executed, and the obtained target data is verified for authenticity based on the verification information.
  • the target data stored on the blockchain further includes auxiliary information related to the authenticity verification; the verification information is based on the original content of the target data and the auxiliary information.
  • the hash value obtained by hashing the information;
  • the verification module 404 further:
  • the auxiliary information includes any one or a combination of the following information:
  • the upload location of the target data is the upload location of the target data.
  • the second obtaining module 403 further:
  • the relevant part may refer to the description of the method embodiment.
  • the device embodiments described above are only schematic, and the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, may be located in One place, or can be distributed to multiple network modules. Some or all of these modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the system, device, module, or module described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or a product with a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or a combination of any of these devices.
  • the electronic device includes a processor and a memory for storing machine-executable instructions; wherein the processor and the memory are usually connected to each other through an internal bus.
  • the device may further include an external interface to enable communication with other devices or components.
  • the processor by reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:
  • the target data has been stored in the blockchain, obtaining the target data from the storage location indicated by the data identifier; wherein the target data stored on the blockchain carries a The verification information of the target data for authenticity verification;
  • the target data published by the data provider carries a graphic code generated based on the data identifier
  • the processor By reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:
  • the data identifier is a transaction hash value of a transaction that includes the target data
  • the processor By reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:
  • SPV verification is performed on the transaction based on the transaction hash value of the transaction containing the target data to determine whether the transaction has been stored in the blockchain.
  • the processor by reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:
  • a smart contract issued on the blockchain is invoked, a verification program declared in the smart contract is executed, and the obtained target data is verified for authenticity based on the verification information.
  • the target data stored on the blockchain further includes auxiliary information related to the authenticity verification; the verification information is based on the original content of the target data and the auxiliary information.
  • the hash value obtained by hashing the information;
  • the processor By reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:
  • the processor by reading and executing machine-executable instructions corresponding to control logic based on blockchain-based data verification stored in the memory, the processor is caused to:

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Artificial Intelligence (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Selon un ou plusieurs modes de réalisation, la présente invention concerne un procédé et un appareil de vérification de données basées sur une chaîne de blocs, et un dispositif électronique. Le procédé peut consister à : acquérir un identifiant de données de données cibles divulguées par un fournisseur de données sur une chaîne de blocs, l'identifiant de données indiquant une position de stockage des données cibles sur la chaîne de blocs ; déterminer si les données cibles sont stockées sur la chaîne de blocs sur la base de l'identifiant de données ; si les données cibles sont stockées sur la chaîne de blocs, acquérir les données cibles à partir de la position de stockage indiquée par l'identifiant de données, les données cibles stockées sur la chaîne de blocs contenant des informations d'authentification servant à vérifier l'authenticité des données cibles ; et vérifier l'authenticité des données cibles acquises sur la base des informations d'authentification et délivrer un résultat de vérification à un vérificateur de données.
PCT/CN2019/080021 2018-06-29 2019-03-28 Procédé et appareil de vérification de données basées sur une chaîne de blocs, et dispositif électronique WO2020001105A1 (fr)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR1020207018958A KR102460055B1 (ko) 2018-06-29 2019-03-28 블록체인-기반 데이터 검증 방법 및 장치, 및 전자 디바이스
EP19825968.1A EP3720045B1 (fr) 2018-06-29 2019-03-28 Procédé et appareil de vérification de données basées sur une chaîne de blocs
CA3087297A CA3087297A1 (fr) 2018-06-29 2019-03-28 Procede et appareil de verification de donnees basees sur une chaine de blocs, et dispositif electronique
JP2020536645A JP2021515427A (ja) 2018-06-29 2019-03-28 ブロックチェーンベースのデータ検証方法および装置、ならびに電子デバイス
SG11202006029RA SG11202006029RA (en) 2018-06-29 2019-03-28 Blockchain-based data verification method and apparatus, and electronic device
AU2019295815A AU2019295815C1 (en) 2018-06-29 2019-03-28 Blockchain-based data verification method and apparatus, and electronic device
US16/888,580 US20200294048A1 (en) 2018-06-29 2020-05-29 Blockchain-based data verification method and apparatus, and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810713248.0A CN109067541B (zh) 2018-06-29 2018-06-29 基于区块链的数据验证方法及装置、电子设备
CN201810713248.0 2018-06-29

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/888,580 Continuation US20200294048A1 (en) 2018-06-29 2020-05-29 Blockchain-based data verification method and apparatus, and electronic device

Publications (1)

Publication Number Publication Date
WO2020001105A1 true WO2020001105A1 (fr) 2020-01-02

Family

ID=64818892

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/080021 WO2020001105A1 (fr) 2018-06-29 2019-03-28 Procédé et appareil de vérification de données basées sur une chaîne de blocs, et dispositif électronique

Country Status (10)

Country Link
US (1) US20200294048A1 (fr)
EP (1) EP3720045B1 (fr)
JP (1) JP2021515427A (fr)
KR (1) KR102460055B1 (fr)
CN (2) CN112491551B (fr)
AU (1) AU2019295815C1 (fr)
CA (1) CA3087297A1 (fr)
SG (1) SG11202006029RA (fr)
TW (1) TWI753228B (fr)
WO (1) WO2020001105A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111899019A (zh) * 2020-07-28 2020-11-06 朱玮 一种黑名单多方交叉验证和共享的方法及系统
KR102241246B1 (ko) * 2020-06-26 2021-04-16 (주)아이앤텍 발급문서의 진위 확인을 위한 블록체인 기반 스탬프 인증 시스템

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491551B (zh) * 2018-06-29 2023-01-20 创新先进技术有限公司 基于区块链的数据验证方法及装置、电子设备
CN109087101B (zh) * 2018-08-07 2021-09-07 北京三快在线科技有限公司 交易校验方法、装置、存储介质及电子设备
JP7135568B2 (ja) 2018-08-13 2022-09-13 コニカミノルタ株式会社 画像検査装置、画像形成装置、及びプログラム
CN110009338B (zh) * 2018-12-25 2020-10-23 创新先进技术有限公司 基于区块链的记账方法及装置、电子设备
CN110046901B (zh) * 2018-12-28 2020-06-30 阿里巴巴集团控股有限公司 联盟链的可信度验证方法、系统、装置及设备
CN109740384B (zh) * 2019-01-11 2023-11-10 众安信息技术服务有限公司 基于区块链的数据存证方法和装置
CN109960949A (zh) * 2019-01-28 2019-07-02 中国科学院数据与通信保护研究教育中心 一种数据存储验证方法及装置
CN109902086B (zh) * 2019-01-31 2022-12-20 创新先进技术有限公司 一种索引创建方法、装置及设备
CN110334175B (zh) * 2019-04-29 2021-06-04 山东冰链网络信息科技有限公司 医疗文档的零知识证明方法、系统及存储介质
CN112750037A (zh) * 2019-04-30 2021-05-04 创新先进技术有限公司 基于区块链的数据压缩、查询方法及装置和电子设备
US10795882B2 (en) 2019-04-30 2020-10-06 Alibaba Group Holding Limited Blockchain-based data compression and searching
US11009859B2 (en) * 2019-05-06 2021-05-18 Fisher-Rosemount Systems, Inc. Framework for privacy-preserving big-data sharing using distributed ledger
CN110223127A (zh) * 2019-05-20 2019-09-10 深圳壹账通智能科技有限公司 票据数据回退方法和系统
FR3099017B1 (fr) * 2019-07-16 2021-08-06 Idemia Identity & Security France Procédé de vérification d’une transaction dans une base de données de type chaîne de blocs
CN111835808B (zh) * 2019-08-01 2023-11-14 北京骑胜科技有限公司 数据存储方法及装置、数据读取方法及装置、存储介质
CN111859347A (zh) * 2019-08-01 2020-10-30 创新先进技术有限公司 基于区块链的身份验证方法、装置及设备
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN110689348B (zh) * 2019-09-30 2023-12-29 腾讯云计算(北京)有限责任公司 基于联盟链的收入验证方法、装置、终端及介质
CN110889264B (zh) * 2019-11-11 2021-06-22 腾讯科技(深圳)有限公司 多媒体信息处理方法、装置、设备及存储介质
CN111145354B (zh) * 2019-12-31 2024-02-13 北京恒华伟业科技股份有限公司 一种bim数据模型的标识方法及装置
CN111478957B (zh) * 2020-04-02 2023-09-08 深圳市人工智能与机器人研究院 基于区块链的实验数据处理方法、装置和计算机设备
CN111539033B (zh) * 2020-07-08 2020-10-09 南京金宁汇科技有限公司 一种在区块链中实现数据计算可信的方法及系统
CN111738725B (zh) * 2020-07-31 2020-12-22 支付宝(杭州)信息技术有限公司 跨境资源转移真实性审核方法、装置及电子设备
CN111723159A (zh) * 2020-08-21 2020-09-29 支付宝(杭州)信息技术有限公司 一种基于区块链的数据验证方法和装置
KR102423523B1 (ko) 2020-11-19 2022-07-21 주식회사 한빛소프트 웹어셈블리 기반 블록체인 플랫폼을 이용한 디지털 콘텐츠의 위변조 판별 시스템 및 이를 이용한 디지털 콘텐츠의 위변조 판별 방법
CN112488681A (zh) * 2020-12-11 2021-03-12 广东广宇科技发展有限公司 基于区块链的授权码支付方法、系统、终端及存储介质
CN112800055A (zh) * 2021-01-18 2021-05-14 湖北宸威玺链信息技术有限公司 基于布隆过滤器的数据验真方法及系统及装置及介质
JP7478440B2 (ja) 2021-03-25 2024-05-07 国立研究開発法人産業技術総合研究所 情報処理方法及び情報処理システム
CN113672994B (zh) * 2021-09-03 2023-12-01 中国联合网络通信集团有限公司 一种基于区块链的烹饪设备数据管理方法、装置及其系统
CN113743783A (zh) * 2021-09-03 2021-12-03 泰康保险集团股份有限公司 一种医疗机构的信用评价方法及装置
CN113779155A (zh) * 2021-09-24 2021-12-10 支付宝(杭州)信息技术有限公司 区块链交易处理方法、装置及设备
CN113821776B (zh) * 2021-11-24 2022-02-08 武汉大学 一种基于联盟链共识机制的存储信息验证方法及系统
CN117408595B (zh) * 2023-12-11 2024-04-30 上海文景信息科技有限公司 一种基于区块链的多式联运全程质控方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160371509A1 (en) * 2013-07-06 2016-12-22 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
CN107819777A (zh) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 一种基于区块链技术的数据存证方法及系统
CN107862216A (zh) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 用于匿名跨链交易的隐私保护方法、装置和存储介质
CN207504911U (zh) * 2017-11-17 2018-06-15 北京亿生生网络科技有限公司 一种基于区块链技术的数据存证系统
CN109067541A (zh) * 2018-06-29 2018-12-21 阿里巴巴集团控股有限公司 基于区块链的数据验证方法及装置、电子设备

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003233652A (ja) * 2002-02-12 2003-08-22 Sharp Corp 品質管理システム、品質管理方法、品質管理プログラム及び品質管理プログラムを記録した記録媒体
JP2004045607A (ja) * 2002-07-10 2004-02-12 Taketoshi Okamoto 電子化証明書、電子化証明書を記録した記録媒体、および、電子化証明書を発行する方法、装置、プログラム、および、電子化証明書を表示する方法、装置、プログラム
JP2004289720A (ja) * 2003-03-25 2004-10-14 Mitsubishi Electric Information Systems Corp 電子署名システム及びそれをコンピュータに実行させるプログラム
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
US20160164884A1 (en) * 2014-12-05 2016-06-09 Skuchain, Inc. Cryptographic verification of provenance in a supply chain
US10007913B2 (en) * 2015-05-05 2018-06-26 ShoCard, Inc. Identity management service using a blockchain providing identity transactions between devices
JP2017041841A (ja) * 2015-08-21 2017-02-23 パナソニックIpマネジメント株式会社 署名生成システム、署名生成装置及び署名生成方法
US9971809B1 (en) * 2015-09-28 2018-05-15 Symantec Corporation Systems and methods for searching unstructured documents for structured data
JP6608256B2 (ja) * 2015-11-26 2019-11-20 株式会社bitFlyer Blockchain 電子データの存在証明プログラムおよび存在証明サーバ
CN105608588A (zh) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 一种溯源记录处理的方法及装置
WO2017218984A1 (fr) * 2016-06-16 2017-12-21 The Bank Of New York Mellon Assurance de l'intégrité des données de transactions exécutées
US10778961B2 (en) * 2016-07-26 2020-09-15 Qcify Inv. Adaptable sorter unit for existing processing lines
US10523443B1 (en) * 2016-08-24 2019-12-31 Bruce Kleinman Devices, methods, and systems for cryptographic authentication and provenance of physical assets
CN106357612B (zh) * 2016-08-25 2019-07-16 江苏通付盾科技有限公司 基于公有区块链的认证记录审查方法及装置
CN106503053B (zh) * 2016-09-26 2019-07-16 江苏通付盾科技有限公司 Utxo查询方法及装置
CN106548091A (zh) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 一种数据存证、验证的方法及装置
CN107391298B (zh) * 2017-07-06 2021-02-09 上海策链信息科技有限公司 数据存储状态检测方法、装置及计算机可读存储介质
CN107316239A (zh) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 一种基于区块链的信息认证和溯源方法及系统
CN107506661B (zh) * 2017-08-15 2020-04-24 河南真二互联网科技有限公司 一种基于区块链的生成房屋历史记录的方法
CN107657438B (zh) * 2017-09-18 2020-12-04 联动优势科技有限公司 一种区块链生成方法、数据验证方法、节点及系统
CN107483498A (zh) * 2017-09-22 2017-12-15 中国联合网络通信集团有限公司 基于区块链的学历认证方法及系统
CN107909372A (zh) * 2017-10-25 2018-04-13 复旦大学 一种基于区块链技术的农产品溯源方法
US9990504B1 (en) * 2017-12-18 2018-06-05 Northern Trust Corporation Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
US10701054B2 (en) * 2018-01-31 2020-06-30 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment
US10878429B2 (en) * 2018-03-28 2020-12-29 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
US10970669B2 (en) * 2018-06-18 2021-04-06 General Electric Company Blockchain enabled transaction processing for an industrial asset supply chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160371509A1 (en) * 2013-07-06 2016-12-22 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
CN107862216A (zh) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 用于匿名跨链交易的隐私保护方法、装置和存储介质
CN107819777A (zh) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 一种基于区块链技术的数据存证方法及系统
CN207504911U (zh) * 2017-11-17 2018-06-15 北京亿生生网络科技有限公司 一种基于区块链技术的数据存证系统
CN109067541A (zh) * 2018-06-29 2018-12-21 阿里巴巴集团控股有限公司 基于区块链的数据验证方法及装置、电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3720045A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102241246B1 (ko) * 2020-06-26 2021-04-16 (주)아이앤텍 발급문서의 진위 확인을 위한 블록체인 기반 스탬프 인증 시스템
CN111899019A (zh) * 2020-07-28 2020-11-06 朱玮 一种黑名单多方交叉验证和共享的方法及系统

Also Published As

Publication number Publication date
EP3720045B1 (fr) 2024-05-08
EP3720045A1 (fr) 2020-10-07
EP3720045A4 (fr) 2021-09-08
AU2019295815B2 (en) 2021-12-09
TWI753228B (zh) 2022-01-21
JP2021515427A (ja) 2021-06-17
AU2019295815C1 (en) 2021-12-23
TW202002569A (zh) 2020-01-01
US20200294048A1 (en) 2020-09-17
SG11202006029RA (en) 2020-07-29
CN109067541A (zh) 2018-12-21
KR20200089749A (ko) 2020-07-27
CN109067541B (zh) 2020-09-22
CA3087297A1 (fr) 2020-01-02
AU2019295815A1 (en) 2020-07-09
CN112491551B (zh) 2023-01-20
CN112491551A (zh) 2021-03-12
KR102460055B1 (ko) 2022-10-27

Similar Documents

Publication Publication Date Title
WO2020001105A1 (fr) Procédé et appareil de vérification de données basées sur une chaîne de blocs, et dispositif électronique
US10705801B2 (en) Data processing systems for identity validation of data subject access requests and related methods
US11798008B2 (en) Blockchain-based product authentication system
TW201937436A (zh) 基於區塊鏈的交易執行方法及裝置、電子設備
KR101948721B1 (ko) 파일 해시 값을 이용한 파일 위변조 검사 방법 및 단말 장치
US20160241531A1 (en) Confidence values
US20240086414A1 (en) Efficient access of chainable records
US11682025B2 (en) Digital appraisal system providing computational attestation of appraisal integrity
US11816098B2 (en) Database system public trust ledger contract linkage
US10979230B1 (en) Block chain proof for identification
JP2020522831A (ja) クラウドソーシングユーザーの信頼性と妥当性の検証のためのシステムおよび方法
CN111414418B (zh) 一种基于区块链的数据存储方法及装置
US11880372B2 (en) Distributed metadata definition and storage in a database system for public trust ledger smart contracts
WO2019179244A1 (fr) Procédé et dispositif de vérification de service
US20230085481A1 (en) Database system public trust token redeem architecture using wallets
CN114004456B (zh) 数据标签的计算方法、装置、计算机设备和存储介质
CN117078263A (zh) 资源转移方法、装置、计算机设备和存储介质
CN117411871A (zh) 影像材料的上传方法、装置、设备、存储介质及程序产品
CN117456072A (zh) 基于区块链的数据处理方法、装置、设备及可读存储介质
CN110597826A (zh) 一种基于区块链网络的数据隔离方法及装置
CN117830005A (zh) 业务处理方法、相关设备、计算机存储介质及程序产品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19825968

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3087297

Country of ref document: CA

Ref document number: 2020536645

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20207018958

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2019825968

Country of ref document: EP

Effective date: 20200629

ENP Entry into the national phase

Ref document number: 2019295815

Country of ref document: AU

Date of ref document: 20190328

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE